Security vulnerabilities of SGX and countermeasures: A survey

S Fei, Z Yan, W Ding, H Xie - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Trusted Execution Environments (TEEs) have been widely used in many security-critical
applications. The popularity of TEEs derives from its high security and trustworthiness …

Adversarial interference and its mitigations in privacy-preserving collaborative machine learning

D Usynin, A Ziller, M Makowski, R Braren… - Nature Machine …, 2021 - nature.com
Despite the rapid increase of data available to train machine-learning algorithms in many
domains, several applications suffer from a paucity of representative and diverse data. The …

SGX-LKL: Securing the host OS interface for trusted execution

C Priebe, D Muthukumaran, J Lind, H Zhu… - arXiv preprint arXiv …, 2019 - arxiv.org
Hardware support for trusted execution in modern CPUs enables tenants to shield their data
processing workloads in otherwise untrusted cloud environments. Runtime systems for the …

COIN attacks: On insecurity of enclave untrusted interfaces in SGX

MR Khandaker, Y Cheng, Z Wang, T Wei - Proceedings of the Twenty …, 2020 - dl.acm.org
Intel SGX is a hardware-based trusted execution environment (TEE), which enables an
application to compute on confidential data in a secure enclave. SGX assumes a powerful …

Crowdguard: Federated backdoor detection in federated learning

P Rieger, T Krauß, M Miettinen, A Dmitrienko… - arXiv preprint arXiv …, 2022 - arxiv.org
Federated Learning (FL) is a promising approach enabling multiple clients to train Deep
Neural Networks (DNNs) collaboratively without sharing their local training data. However …

A {Log-Structured} Merge Tree-aware Message Authentication Scheme for Persistent {Key-Value} Stores

I Kim, JH Kim, M Chung, H Moon, SH Noh - 20th USENIX Conference on …, 2022 - usenix.org
Persistent key-value stores (KVSs) are fundamental building blocks of modern software
products. A KVS stores persistent states for the products in the form of objects associated …

[HTML][HTML] FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation

K Mahbub, A Nehme, M Patwary, M Lacoste, S Allio - Future Internet, 2024 - mdpi.com
Self-driving vehicles have attracted significant attention in the automotive industry that is
heavily investing to reach the level of reliability needed from these safety critical systems …

[HTML][HTML] TFHE-rs: A library for safe and secure remote computing using fully homomorphic encryption and trusted execution environments

L Brenna, IS Singh, HD Johansen, D Johansen - Array, 2022 - Elsevier
Abstract Fully Homomorphic Encryption (FHE) and Trusted Execution Environ-ments (TEEs)
are complementing approaches that can both secure computa-tions running remotely on a …

TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack

T Xu, AA Ding, Y Fei - … on Hardware Oriented Security and Trust …, 2024 - ieeexplore.ieee.org
ARM's TrustZone is a hardware-based trusted execution environment (TEE), prevalent in
mobile devices, IoT edge systems, and autonomous systems. Within TrustZone, security …

[PDF][PDF] Safe and secure outsourced computing with fully homomorphic encryption and trusted execution environments

IS Singh - Master's thesis, UiT Norges arktiske universitet, 2020 - munin.uit.no
Increases in data production and growing demands for more computing power leads to the
current trend of outsourcing data and computation services to cloud providers. With data …